Update Biblio_Décembre_2023.bib

T
Этот коммит содержится в:
Principe Debase 2024-01-01 11:02:42 +01:00 коммит произвёл GitHub
родитель 0fffa009de
Коммит c163d33db3
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: 4AEE18F83AFDEB23

Просмотреть файл

@ -531,6 +531,12 @@
isbn = {9782100748280},
keyword={Cyberguerre, Cyberstratégie, Géopolitique}}
@book{étiquette,
author={Ferguson, Niels and Schneier, Bruce and Kohno, Tadayoshi},
title = {Cryptography Engineering: design principles and practical applications},
year = {2011},
publisher= {John Wiley \& Sons}}
@book{étiquette,
author = {Foster, James JF},
title = {Digital influence mercenaries, profits and power through information warfare},
@ -1289,7 +1295,7 @@
author = {Roccia, Thomas},
title = {Visual Threat Intelligence, An illustrated Guide For Threat Researchers},
year = {2023},
note = {livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel},
note = {Livre numérique pour l'instant, disponible au lien suivant : https://store.securitybreak.io/threatintel},
keyword = {Cyber Threat Intell, CTI}}
@book{étiquette,
@ -1330,7 +1336,7 @@
@book{étiquette,
author = {Sanger, David},
title = {Confront and Conceal: Obamas secret wars},
title = {Confront and Conceal: Obamas secret wars and surprising use of American power},
year = {2012},
publisher= {Crown},
keyword = {stratégie, géopolitique,cyberguerre},
@ -1339,7 +1345,7 @@
@book{étiquette,
author = {Sanger, David},
title = {The Perfect Weapon: War, Sabotage and Fear in the Cyber Age},
year = {2019},
year = {2018},
publisher= {Crown},
isbn = {978-0451497901}}
@ -1354,12 +1360,11 @@
title = {Tallinn manual 2.0 on the international law applicable to cyber operations},
year = {2017},
publisher = {Cambridge university press},
address = {Cambridge, Royaume-Uni},
isbn = {978-1-316-63037-2}}
@book{étiquette,
author = {Schneier, Bruce},
title = {Applied Cryptography},
title = {Applied Cryptography: Protocols, Algorthms, and Source Code in C.},
year = {1996},
publisher= {John Wiley \& Sons}}
@ -1370,19 +1375,6 @@
publisher= {John Wiley \& Sons},
isbn = {0471453803}}
@book{étiquette,
author = {Schneier, Bruce},
title = {Cryptography Engineering},
year = {2010},
publisher= {John Wiley \& Sons}}
@book{étiquette,
author = {Schoch, Patrice and Akdim, Hamid and Sennouni, Amine and Jourt-Pineau, Cécilia},
title = {Pilotage stratégique 5.0 \& résilience des organisations},
year = {2021},
publisher = {L'Harmatan},
isbn = {978-2-343-23786-2}}
@book{étiquette,
author = {Schradie, Jen},
title = {L'illusion de la démocratie numérique. Internet est-il de droite ?},
@ -1402,7 +1394,7 @@
@book{étiquette,
author = {Séjean, Michel},
title = {Code de la cybersécurité},
year = {2022},
year = {2023},
publisher= {Lefevre Dalloz},
keyword={droit},
note={un incontournable pour ceux qui souhaitent maitriser le droit associé à la cybersécurité}}
@ -1418,7 +1410,7 @@
@book{étiquette,
author = {Shimomura,Tsutomu and Markoff, John},
title = {Cybertraque. La chasse au pirate informatique le plus célèbre des États-Unis},
title = {Cybertraque : la chasse au pirate informatique le plus célèbre des États-Unis},
year = {1998},
publisher = {Plon},
note = {Traduction française de "Katching Kevin", récit du hack et de la traque de Kevin Mitnick en 1995},
@ -1429,8 +1421,7 @@
title = {Cognitive Surplus: Creativity and Generosity in a Connected Age},
year = {2010},
publisher= {Penguin Press},
isbn = {9780141041605},
note = {In Cognitive Surplus, Internet guru Clay Shirky forecasts the thrilling changes we will all enjoy as new digital technology puts our untapped resources of talent and goodwill to use at last. }}
isbn = {9780141041605}}
@book{étiquette,
author = {Sikorski, Michael and Honig, Andrew},
@ -1438,16 +1429,6 @@
year = {2012},
publisher= {No Starch Press}}
@book{étiquette,
title = {The {Infinite} {Game}},
isbn = {978-0-7352-1350-0},
publisher = {Portfolio},
author = {Sinek, Simon},
year = {2019},
keywords = {personal development},
url = {https://www.amazon.fr/Infinite-Game-Simon-Sinek/dp/073521350X},
note = {ou comment penser long terme, et pourquoi il faut arrêter de réfléchir court terme une lecture intéressante lors de la définition dune stratégie.}}
@book{étiquette,
author = {Singer, P.W and Cole, August},
title = {La flotte fantôme},
@ -1469,7 +1450,7 @@
author = {Smeets, Max},
title = {No Shortcuts. Why States Struggle to Develop a Military Cyber-Force},
year = {2022},
publisher= {Hurst}}
publisher= {Oxford University Press}}
@book{étiquette,
author = {Stamboliyska, Rayna},
@ -1483,10 +1464,10 @@
year={2020},
publisher={Springer Vieweg},
keyword={Cybersécurité, Attribution},
note = {un livre qui traite en profondeur la problématique de lattribution, mais aussi lensemble des concepts clés de la CTI}}
note = {Un livre qui traite en profondeur la problématique de lattribution, mais aussi lensemble des concepts clés de la CTI}}
@book{étiquette,
author={stengel, Richard},
author={Stengel, Richard},
title={Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do About It},
year={2019},
publisher={Atlantic Monthly Press},
@ -1504,7 +1485,7 @@
author = {Stoll, Clifford},
title = {The Cuckoo's Egg},
year = {1989},
publisher= {New York: Doubleday}}
publisher= {Doubleday}}
@comment{T}